IT Governance, Risk, and Compliance:

May, 2013

Since contracts, transactions and disputes relating to information assets can involve parties, actions and evidence in multiple distinct jurisdictions, it may be advantageous for entities to clarify existing rules or presumptions regarding the laws pertinent to IAP. Additionally, assuming...

Intellectual property laws address something produced by the mind, of which the ownership or right to usage is legally protected. Intellectual property can denote knowledge-based assets as well as capital, including information or data that can result in intellectual capital extending to ideas,...

Data privacy laws dictate adherence to trusts and obligations associated with any information connected to an identified or identifiable data subject. Personal data privacy generally refers to information that can be associated with a specific individual, or that has identifying characteristics...

Security laws can decree the required degree of protection for property, usually based on governmental interest. Specifically, information security laws may outline control measures to prevent unauthorized access to devices that process sensitive data. Inclusively, directed data control measures...

Information systems may be of a public or private nature, and contain elements protected by various data security, data privacy, or intellectual property laws. Property classification into public and private categories is based on ownership. If the property is owned by the government or a political...